TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
778
Module.It is provided by the file Spider.ocx or Spider90.ocx. This ActiveX control contains a stack buffer overflow in
the ProgColor property.The target ActiveX Control is part of the Mercury Quality Center web application which runs
on port 8080 by default.An attacker remotely log into the web application will have to install the vulnerable control,
can create specially crafted HTML that, when loaded by the target user, will trigger a stack overflow in the
'Spider90.ocx' ActiveX control used by HP Mercury Quality Center and execute arbitrary code on the target
system.The code will run with the privileges of the target user.A specially crafted 'ProgColor' parameter value can
trigger the overflow.The vulnerability reportedly affects version 8.2 SP1 and 9.0.Patches available in HP Security
Bulletin.
Signature ID: 34152
HPMQC SPIDERLib ActiveX Control (ProgID) Buffer Overflow Vulnerability.
Threat Level: Warning
Industry ID: CVE-CVE-2007-1819 Bugtraq: 23239
Signature Description: Hewlett-Packard Mercury Quality Center is a web-based interface that allows managers to
automate software quality testing. HP Mercury Interactive Quality Center includes an ActiveX control called Spider
Module. It is provided by the file Spider.ocx or Spider90.ocx. This ActiveX control contains a stack buffer overflow in
the ProgColor property. The target ActiveX Control is part of the Mercury Quality Center web application which runs
on port 8080 by default.An attacker remotely log into the web application will have to install the vulnerable control,
can create specially crafted HTML that, when loaded by the target user, will trigger a stack overflow in the
'Spider90.ocx' ActiveX control used by HP Mercury Quality Center and execute arbitrary code on the target
system.The code will run with the privileges of the target user. A specially crafted 'ProgColor' parameter value can
trigger the overflow. The vulnerability reportedly affects version 8.2 SP1 and 9.0.Patches available in HP Security
Bulletin.
Signature ID: 34153
HPMQC SPIDERLib ActiveX Control Buffer Overflow vulnerability
Threat Level: Severe
Industry ID: CVE-2007-1819 Bugtraq: 23239
Signature Description: Hewlett-Packard Mercury Quality Center is a web-based interface that allows managers to
automate software quality testing.HP Mercury Interactive Quality Center includes an ActiveX control called Spider
Module.It is provided by the file Spider.ocx or Spider90.ocx. This ActiveX control contains a stack buffer overflow in
the ProgColor property. The target ActiveX Control is part of the Mercury Quality Center web application which runs
on port 8080 by default.An attacker remotely log into the web application will have to install the vulnerable control,
can create specially crafted HTML that, when loaded by the target user, will trigger a stack overflow in the
'Spider90.ocx' ActiveX control used by HP Mercury Quality Center and execute arbitrary code on the target
system.The code will run with the privileges of the target user.A specially crafted 'ProgColor' parameter value can
trigger the overflow. The vulnerability reportedly affects version 8.2 SP1 and 9.0.Patches available in HP Security
Bulletin.
Signature ID: 34154
HPMQC SPIDERLib ActiveX Control Buffer Overflow Vulnerability.
Threat Level: Severe
Industry ID: CVE-2007-1819
Bugtraq: 23239
Signature Description: Hewlett-Packard Mercury Quality Center is a web-based interface that allows managers to
automate software quality testing.HP Mercury Interactive Quality Center includes an ActiveX control called Spider
Module.It is provided by the file Spider.ocx or Spider90.ocx. This ActiveX control contains a stack buffer overflow in
the ProgColor property. The target ActiveX Control is part of the Mercury Quality Center web application which runs
on port 8080 by default. An attacker remotely log into the web application will have to install the vulnerable activex
control control, or can create specially crafted HTML page that contain hex encoded exploit data, when loaded by the
target user, will trigger a stack overflow in the 'Spider90.ocx' ActiveX control used by HP Mercury Quality Center and